Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.
Andreas EkelhartElmar KieslingBernhard GrillChristine StraussChristian StummerPublished in: Inf. Technol. Manag. (2015)
Keyphrases
- security analysis
- discrete event simulation
- smart card
- semiconductor manufacturing
- public key
- discrete event
- security requirements
- high security
- defense mechanisms
- security properties
- user authentication
- image encryption
- supply chain
- authentication scheme
- encryption scheme
- authentication protocol
- simulation model
- mutual authentication